Course detail

Information Security Seminar

FEKT-MPA-SIBAcad. year: 2025/2026

The course covers the topics of advanced cryptography and implementation of cryptographic algorithms used for assuring ICT system security. In particular, the course covers: formal proofs based on simulation paradigms, standard security model and random oracle security model, security definitions of signature schemes, security definitions of encryption schemes, security definitions of privacy-enhancing schemes, security frameworks (UC – Universal Composability Framework), implementation aspects of modern cryptographic schemes, particularly the commitment schemes, group signatures and privacy-enhancing schemes, such as attribute-based schemes.

Language of instruction

English

Number of ECTS credits

2

Mode of study

Not applicable.

Entry knowledge

Students must have the background in symmetric and asymmetric cryptography and discrete mathematics equivalent to knowledge provided by compulsory courses BZKR and TAKR of the Bachelor’s program T-IBP.

Rules for evaluation and completion of the course

The maximum of 30 points is given upon completion of the theoretical test in seminar. The maximum of 70 points can be gained by completing the final project.
The conditions for the successful course completion are stated in the yearly updated supervisor’s notice.

Aims

The goal of the course is to provide students with the overview of the actual trends in cryptography and system security. Students will learn the advanced techniques used in modern cryptography that are based on the provable security concept. Furthermore, formal security models and security proving techniques are covered. This theoretical knowledge is illustrated using practical examples of the architectures and implementations of modern encryption schemes, signature schemes and privacy-enhancing schemes.
By passing the course, students will get the knowledge of advanced cryptography, in particular of the trends in modern cryptographic protocol design. Students will obtain the skills necessary for secure design based on provable security using widely accepted formal models and definitions. Students will be able to design modern protocols and understand the specifications of upcoming cryptographic systems. By passing the course, students will learn the actual state in the implementation and use of cryptographic algorithms in real-world systems for assuring ICT security.

Study aids

Not applicable.

Prerequisites and corequisites

Not applicable.

Basic literature

BURDA, Karel. Aplikovaná kryptografie. 1. vyd. Brno: VUTIUM, 2013. ISBN 978-80-214-4612-0.
MENEZES, Alfred, Paul C VAN OORSCHOT a Scott A VANSTONE. Handbook of applied cryptography. Boca Raton: CRC Press, c1997. Discrete mathematics and its applications. ISBN 0-8493-8523-7.

Recommended reading

Not applicable.

Classification of course in study plans

  • Programme MPC-IBE Master's 2 year of study, summer semester, compulsory

Type of course unit

 

Seminar

26 hod., compulsory

Teacher / Lecturer

Syllabus

1. Formal proofs of cryptographic system properties
2. Random oracle model
3. Standard model
4. Universally Composable Framework
5. Formal definitions of encryption schemes
6. Formal definitions of basic cryptographic primitives schemes
7. Formal definitions of signature schemes
8. Formal definitions of privacy-enhancing schemes
9. Modern cryptographic schemes – group signatures
10. Modern cryptographic schemes – authentication, identification schemes
11. Modern cryptographic schemes – privacy protection
12. Implementation aspects of modern cryptography